- The Windows 2000\XP\.NET Resource Index
Home | About Us | Search |

Last Updated December 10, 2003

LabMice Link of the Day Archive - February 2002
As we surf the web in our pursuit of additional content for LabMice, we occasionally stumble upon a really cool, humorous, unusual, or very useful link that we think should stand out from the hundreds we add every week. So we developed a small section on our front page to highlight these, and will archive the rest here.
This Month:

Have iPod, Will Secretly Bootleg
Apple's iPod can be used to copy software from display computers at stores like CompUSA. Although designed as a digital music player, its roomy 5-GB hard drive and FireWire interface allows huge files to be copied in seconds. And while the iPod has a built-in anti-piracy mechanism that prevents music files from being copied from one computer to another, it has no such protections for software. Will it herald a new era of virtual shoplifting? Source: Wired 

Sniffers: What They Are and How to Protect Yourself
A sniffer is a tool that allows the user to view network traffic. This nifty utility can be
found in the arsenal of every network guru, where it's used for a variety of tasks. This article will offer a brief overview of sniffers, including what they do, how they work, why users need to be aware of them, and what users can do to protect themselves against the illegitimate use of sniffers. Source:

Anti-Virus's Control Fetish
New York State Attorney General Eliot Spitzer filed a lawsuit against Network Associates over an odious clause -- a "restrictive covenant" in the parlance -- that the company had employed in its end user license agreement to hinder the public's ability to criticize its software products. The lawsuit against Network Associates exposes one of the anti-virus industry's most deeply rooted character defects. Source:

Microsoft Admits XP Media Player Spies on Users
has confirmed that the Windows XP version of its Windows Media Player is programmed to track which CDs users listen to and which DVDs they watch. The company also has altered its privacy statement to admit that its player software tracks DVD content, which was not previously mentioned. Source:

In Search of Quiet Computing
Faster processors, high speed drives, and even 3D video cards are contributing to the heat being generated by your PC, and the amount of noisy fans required to cool it. If the noise from your computer is hindering your productivity, here's some advice to help overcome it.

From Blueprint to Fortress: A Guide to Securing IIS 5.0
Servers can be vulnerable to a host of attacks. As a server administrator or architect, you want to be sure you account for all areas of security when setting up Web servers. This document provides a blueprint for administrators and system architects to secure a Microsoft© Internet Information Server (IIS) 5.0 Web server. Source:

Heuristic Techniques in AV Solutions: An Overview
Heuristic technologies can be found in nearly all current anti-virus (herein referred to as AV) solutions and also in other security-related areas like intrusion detection systems and attack analysis systems with correlating components. This article will offer a brief overview of generic heuristic approaches within AV solutions with a particular emphasis on heuristics for Visual Basic for Applications-based malware. Source:

Addressing DoS Vulnerabilities
Last month, Microsoft published an article that documents five registry modifications you can use to reduce Windows 2000's TCP vulnerability to a variety of Denial of Service (DoS) attacks. These guidelines are appropriate for Win2K systems connected to a WAN or to the Internet and for sites that operate under strict security controls. Source: Windows & .NET Magazine

Layoff lessons learned and tips for job-seekers
The abrupt about-face in the job market has left many IT pros in shell shock. But those who fell victims to the last recession a decade ago saw it coming and can offer tips on how plan for a brighter future. Source: ComputerWorld 

Identifying vulnerabilities in networked systems
Ensuring adequate and appropriate network security is a long-term investment that is an ongoing process. Here are some suggestions to avoid having to lose data to super worms, viruses or network intruders. Source: ServerWorld Magazine

Living with Worms, Viruses and Daily Security
Despite tremendous advances, security pros still lag one step behind the attackers, and it won't get better any time soon. While any number of factors have contributed to this state of affairs, experts say they can be boiled down to two main problems: overly complex software and sloppy development practices. Source: eWeek

Is Microsoft Delivering Operating Systems Too Fast Now?
It took Microsoft Corp. more than four years to deliver Windows 2000. Since then, the software giant seems to have set a much snappier pace for operating system releases. Some analysts © and more than a few users © are saying that Microsoft could do itself and its customers a favor by reining-in its aggressive product development and marketing timetables. Source: ENT Online

State of the OS: Windows 2000 at 2 Years
Windows 2000 turns two years old this month. The operating system continues to enjoy a reputation for reliability and stability, and Windows 2000 made significant scalability strides in 2001. Still migrations to the operating system continue to drag and serious doubts have emerged about Microsoft's ability to secure its products. Considerable confusion also exists about the direction Microsoft is taking with the next versions of Windows. Source: ENT Online

New Win2K Post-SP2 Security Rollup Dos and Don'ts
Microsoft released a comprehensive security update for Windows 2000 post-Service Pack 2 (SP2) systems on January 30. Security Rollup Package 1 (SRP1), which you can install only on Win2K SP2 systems, includes every security hotfix Microsoft has issued for post-SP2 systems, except the Web Distributed Authoring and Versioning (WebDAV) script hotfix. Source: Windows & .NET Magazine 

Sorting through the dreck of Microsoft's licensing policy
Why is your company paying for software upgrades it doesn't need? And what is Microsoft's part in it? Darwin's Scott Berinato gives you the bottom line. Source: Darwin

The Windows XP defragger - is it good enough for the enterprise?
Microsoft knew that the defragmenter it bundled with NT and Windows 2000 was a significant weakness for computers used in the enterprise. So Bill Gates' wizards beefed it up for Windows XP. The result is a definite improvement, but it lacks the functionality required for a network environment - even Microsoft agrees. Source: ServerWorld

Analysts: Wait for standards before purchasing server blades
Although the new server blades from HP, Compaq and others are a great way to conserve space, most companies should put off server blade purchases until a blade server standard is developed, analysts from Gartner Dataquest said in a report issued this week. Source: ServerWorld Magazine

Windows Security Scripting
The Unix world calls them shell scripts. The DOS world calls them batch files. Whatever you call them, command line scripts are easy to forget in the GUI world of Windows. While scripting on Windows isn't as powerful as on Unix, some of the improvements introduced in Windows NT 4.0 may surprise you. Scripts are ideal for ensuring consistency, for scheduling periodic tasks and for automating tedious tasks. In other words, they're perfect for security. Source: InfoSecurity Magazine

Microsoft stops new work to fix bugs
On Friday, Microsoft Corp. announced a month-long moratorium on new coding as part of its Trustworthy Computing Initiative, said Richard Purcell, director of the company©s corporate computing office. ©We are not coding new code as of today for the next month,© Purcell said.
Instead, the company is going to go over its old code as a first step in cleaning out bugs. Purcell likened it to a 20-year spring cleaning. ©It?s time to get the garage cleaned out,© he said. Source: Government Computer News

Work for the Best Boss: Yourself
Are you fed up with where you are, of the politics, of the senseless hours of menial work? Do you envy the consultant who pops in for a few hours, does some magic and then is off to the next client © or a round of golf? Are you jealous of the contractor down the hall who is immune to the office politics because her contract is done in five months? This self-employed IT consultant offers some excellent advice for those considering becoming their own boss. Source: 8Wire

Past Archives

January February March
April May June
July August September
October November December
This site and its contents are Copyright 1999-2003 by Microsoft, NT, BackOffice, MCSE, and Windows are registered trademarks of Microsoft Corporation. Microsoft Corporation in no way endorses or is affiliated with The products referenced in this site are provided by parties other than makes no representations regarding either the products or any information about the products. Any questions, complaints, or claims regarding the products must be directed to the appropriate manufacturer or vendor.